![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
將Memecoin平台利用,以使黑客利用新發射的代幣以耗盡流動性。
Hackers have exploited Binance’s Four.Meme platform to drain liquidity from certain meme tokens.
黑客已經利用了Binance的四分之二的平台來耗盡某些模因令牌的流動性。
According to reports, the hackers bypassed the listing process and created trading pairs for tokens that had not yet completed their bonding curve. As a result, Four.Meme has temporarily paused any form of token launch and is fully investigating the incident.
據報導,黑客繞過了上市過程,並為尚未完成其粘結曲線的代幣創建了交易對。結果,Four.meme暫時暫停了任何形式的令牌發布,並正在全面調查該事件。
The memecoin platform was exploited in such a way that the hackers exploited newly launched tokens to drain liquidity. They did it by bypassing certain restrictions and creating unauthorized trading pairs on PancakeSwap and went on to empty liquidity pools through an unapproved DEX listing. This incident happened around 04:00 GMT, during peak Asian market hours.
將Memecoin平台利用,以使黑客利用新發射的代幣以耗盡流動性。他們通過繞過某些限制並在煎餅中創建未經授權的交易對來做到這一點,然後通過未經批准的DEX上市來空運流動性池。這一事件發生在亞洲高峰時段的格林尼治標準時間04:00左右。
In response, Four.Meme quickly suspended new token launches and began an emergency investigation. The team at Four Meme stated that they have put in security improvements and promised compensation for everyone who was affected by the exploitation and they should submit a form with required details to receive reimbursement.
作為回應,四人迅速暫停了新的令牌發射,並開始了緊急調查。四個模因的團隊表示,他們已經對受剝削影響的每個人進行了安全改進,並承諾為每個受剝削影響的人提供賠償,並應提交一份表格,並提供所需的詳細信息以獲得報銷。
payloads : [ { "type" : "email", "email" : "chainalysis@gmail.com" , "subject" : "Hackers Drain Liquidity From Binance’s Four.Meme Platform" , "message" : "Hackers have exploited Binance’s Four.Meme platform to drain liquidity from certain meme tokens. They did it through bypassing the listing process and creating trading pairs for tokens that had not yet completed their bonding curve. As a result, Four.Meme has temporarily paused any form of token launch and is fully investigating the incident.The memecoin platform was exploited in such a way that the hackers exploited newly launched tokens to drain liquidity. By bypassing certain restrictions, they created unauthorized trading pairs on PancakeSwap and went on to empty liquidity pools through an unapproved DEX listing. This incident happened around 04:00 GMT, during peak Asian market hours. In response, Four.Meme quickly suspended new token launches and began an emergency investigation. The team assured users that they have put in security improvements and promised compensation for everyone who was affected by the exploitation and they should submit a form with required details to receive reimbursement.SlowMist Raises the Alarm for Four.Meme Exploitation SlowMist first reported the security breach by stating that the attacker took advantage of some specific function in Four.Meme’s smart contract to buy tokens even before their official release. 🚨SlowMist Security Alert🚨The attacker purchased a small amount of tokens before launch through the 0x7f79f6df function of @four_meme_, and used this feature to send tokens to a specified PancakeSwap Pair address that had not yet been created. This allowed the attacker to… https://t.co/hyXyKcc2Oq pic.twitter.com/Tjgz9tvuw8
有效載荷:[{“ type”:“ email”,“ email”:“ chainalsys@gmail.com”,“主題”:“ hackers從Binance的Four.meme平台上流動流動性。結果,曲線暫時暫停了任何形式的令牌,並充分調查了該事件。 04:00 GMT在亞洲高峰時段。四分之一的特定功能的優勢。 🚨SlowMistSecurity警報🚨攻擊者在通過@Four_Meme_的0x7F79F6DF函數啟動之前購買了少量令牌,並使用此功能將令牌發送到尚未創建的指定pancakeswap Pair。這使攻擊者可以……https://t.co/hyxykcc2oq pic.twitter.com/tjgz9tvuw8
Using the 0x7f79f6df function, the hackers sent these early tokens to a PancakeSwap pair address that did not yet exist. This allowed them to create the pair and add liquidity without moving the unissued tokens, bypassing transfer limits set even before launch. As a result, they set liquidity at an unintended price and drained the pool’s funds.
使用0x7F79F6DF函數,黑客將這些令牌發送到尚不存在的pancakeswap對地址。這使他們能夠創建這對並增加流動性,而無需移動未發行的代幣,甚至在啟動之前繞開了轉移限制。結果,他們以意想不到的價格設定了流動性,並耗盡了游泳池的資金。
So basically, they used a special function to send these tokens to a PancakeSwap address that didn’t exist. This let them create a trading pair and add funds without following the normal rules and because of this, they set their own prices and took money from the pool.
因此,基本上,他們使用特殊功能將這些令牌發送到不存在的pancakeswap地址。這使他們創建了一個交易對並增加資金而不遵循正常規則,因此,他們設定了自己的價格並從游泳池裡拿走了錢。
The platform has not yet disclosed the total amount of losses from the attack. However, BscScan data shows that the hacker added liquidity to a PancakePair, reaching a balance of 4.02 trillion tokens.
該平台尚未透露襲擊中的總損失總量。但是,BSCSCAN數據顯示,黑客將流動性增加了,達到4.02萬億代幣。
This is not the first time Four.Meme has faced hack related issues. In February, the platform was hit by a major exploit, that led to a loss of about $183,000. The hacker manipulated liquidity by setting up a fake pool on PancakeSwap V3 before the real one went live. Related Reading | Strategy Announces 5M Series A Perpetual Strife Preferred Stock to Fund Bitcoin Acquisition
這不是第四次。Meme面臨與黑客相關的問題。 2月,該平台受到了一個重大漏洞的打擊,導致損失約183,000美元。黑客通過在pancakeswap v3上設置假池來操縱流動性,然後才能實現。相關閱讀|策略宣布5M系列A永久性爭辯優先股票以資助比特幣的收購
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- 鯨魚正在購買總督蘸醬
- 2025-03-19 21:31:00
- 鏈上的數據表明,在價格崩潰中,鯨魚繼續積累狗狗幣。
-
- Binance Coin(BNB)價格難以超過$ 640的供應區
- 2025-03-19 21:31:00
- 隨著市場上波動的增長,BNB Price見證了盤中的回調1.72%。
-
- 儘管價格下跌,但Dogecoin(Doge)鯊魚和鯨魚錢包仍在擴大
- 2025-03-19 21:31:00
- 鏈上的數據顯示,Dogecoin鯊魚和鯨魚錢包最近的數量一直在增加,這一標誌可能是Doge的價格。
-
- 標準包機將以太坊(ETH)價格目標降低至$ 4000
- 2025-03-19 21:31:00
- Ethereum(ETH)因全球銀行標準而受到打擊,將其年終價格預期從10000美元降低到僅4000美元。
-
-
- 比特幣期貨市場經歷重大重置,開放興趣下降了14%
- 2025-03-19 21:31:00
- 比特幣期貨市場最近幾周經歷了重大的重置,而交易量開始反彈,開放興趣急劇下降。
-
-
-
- 加密貨幣市場繼續表現出波動性,比特幣(BTC)下跌低於$ 83,000
- 2025-03-19 21:25:59
- 加密貨幣市場繼續表現出波動性,比特幣(BTC)下跌低於$ 83,000